Follow
Lang Lin
Lang Lin
ANSYS, Intel, UMass
Verified email at ansys.com - Homepage
Title
Cited by
Cited by
Year
Trojan side-channels: Lightweight hardware trojans through side-channel engineering
L Lin, M Kasper, T Güneysu, C Paar, W Burleson
Cryptographic Hardware and Embedded Systems-CHES 2009: 11th International …, 2009
2762009
MOLES: Malicious off-chip leakage enabled by side-channels
L Lin, W Burleson, C Paar
Proceedings of the 2009 international conference on computer-aided design …, 2009
2022009
Low-power sub-threshold design of secure physical unclonable functions
L Lin, D Holcomb, DK Krishnappa, P Shabadi, W Burleson
Proceedings of the 16th ACM/IEEE international symposium on Low power …, 2010
1092010
Design and validation of arbiter-based PUFs for sub-45-nm low-power security applications
L Lin, S Srivathsa, DK Krishnappa, P Shabadi, W Burleson
IEEE Transactions on Information Forensics and Security 7 (4), 1394-1403, 2012
742012
Leakage-based differential power analysis (LDPA) on sub-90nm CMOS cryptosystems
L Lin, W Burleson
2008 IEEE International Symposium on Circuits and Systems (ISCAS), 252-255, 2008
592008
Analysis and mitigation of process variation impacts on power-attack tolerance
L Lin, W Burleson
Proceedings of the 46th annual design automation conference, 238-243, 2009
412009
Source cell-phone identification in the presence of additive noise from CQT domain
T Qin, R Wang, D Yan, L Lin
Information 9 (8), 205, 2018
302018
A fast side-channel leakage simulation technique based on IC chip power modeling
A Tsukioka, K Srinivasan, S Wan, L Lin, YS Li, N Chang, M Nagata
IEEE Letters on Electromagnetic Compatibility Practice and Applications 1 (4 …, 2019
282019
Implementing hardware trojans: Experiences from a hardware trojan challenge
GT Becker, A Lakshminarasimhan, L Lin, S Srivathsa, VB Suresh, ...
2011 IEEE 29th International Conference on Computer Design (ICCD), 301-304, 2011
262011
Multiphysics simulation of em side-channels from silicon backside with ml-based auto-poi identification
L Lin, D Zhu, J Wen, H Chen, Y Lu, N Chang, C Chow, H Shrivastav, ...
2021 IEEE International Symposium on Hardware Oriented Security and Trust …, 2021
162021
Security properties driven pre-silicon laser fault injection assessment
N Pundir, H Li, L Lin, N Chang, F Farahmandi, M Tehranipoor
2022 IEEE International Symposium on Hardware Oriented Security and Trust …, 2022
122022
Fast and comprehensive simulation methodology for layout-based power-noise side-channel leakage analysis
L Lin, D Selvakumaran, D Zhu, N Chang, C Chow, M Nagata, K Monta
2020 IEEE International Symposium on Smart Electronic Systems (iSES …, 2020
112020
Detection of replay attack based on normalized constant q cepstral feature
Y Ye, L Lao, D Yan, L Lin
2019 IEEE 4th International Conference on Cloud Computing and Big Data …, 2019
92019
A replay speech detection algorithm based on sub-band analysis
L Lin, R Wang, Y Diqun
Intelligent Information Processing IX: 10th IFIP TC 12 International …, 2018
82018
Design optimization and security validation of sub-threshold PUFs
L Lin, D Holcomb, DK Krishnappa, P Shabadi, W Burleson
Proceedings of the Secure Component and System Identification Workshop …, 2010
82010
A robust method for speech replay attack detection
L Lin, R Wang, D Yan, L Dong
KSII Transactions on Internet and Information Systems (TIIS) 14 (1), 168-182, 2020
72020
Silicon-correlated simulation methodology of em side-channel leakage analysis
K Monta, L Lin, J Wen, H Shrivastav, C Chow, H Chen, J Geada, ...
ACM Journal on Emerging Technologies in Computing Systems 19 (1), 1-23, 2022
62022
SPILL—Security Properties and Machine-Learning Assisted Pre-Silicon Laser Fault Injection Assessment
N Pundir, H Li, L Lin, N Chang, F Farahmandi, M Tehranipoor
International Symposium for Testing and Failure Analysis 84437, 225-236, 2022
52022
Ml-augmented methodology for fast thermal side-channel emission analysis
N Chang, D Zhu, L Lin, D Selvakumaran, J Wen, S Pan, W Xia, H Chen, ...
Proceedings of the 26th Asia and South Pacific Design Automation Conference …, 2021
52021
Layout-level vulnerability ranking from electromagnetic fault injection
L Lin, J Wen, H Shrivastav, W Li, H Chen, G Ni, S Chowdhury, C Chow, ...
2022 IEEE International Symposium on Hardware Oriented Security and Trust …, 2022
42022
The system can't perform the operation now. Try again later.
Articles 1–20